Monday, 29 January 2018

What is 1G, 2G,2.5G, 3G ,4G, 4G LTE and 5G ?


Did you think about 1G, 2G,2.5G, 3G ,4G, 4G LTE and 5G ? 

What are the Standards of the G’s
Each of the Generations has standards that must be met to officially use the G terminology. Those standards are set by, you know, those people that set standards. The standards themselves are quite confusing but the advertisers sure know how to manipulate them. I will try to simplify the terms a bit.
The "G" in wireless networks refers to the "Generation" of the underlying wireless network technology. Technically generations are defined as follows:

It is still a challenge to get a true 4G connection, which promises upwards of a 1 Gps, Gigabit per second, transfer rate if you are standing still and in the perfect spot. 4G LTE comes very close to closing this gap. True 4G on a wide spread basis may not be available until the next generation arrives. 5G?

1G A term never widely used until 2G was available. This was the first generation of cell phone technology. Simple phone calls were all it was able to do.

2G The second generation of cell phone transmission. A few more features were added to the menu such as simple text messaging.

2.5G –The enhanced versions of 2G networks with theoretical data rates up to about 144kbit/s. GPRS offered the first always-on data service.

3G This generation set the standards for most of the wireless technology we have come to know and love. Web browsing, email, video downloading, picture sharing and other Smartphone technology were introduced in the third generation. 3G should be capable of handling around 2 Megabits per second.

4G The speed and standards of this technology of wireless needs to be at least 100 Megabits per second and up to 1 Gigabit per second to pass as 4G. It also needs to share the network resources to support more simultaneous connections on the cell. As it develops, 4G could surpass the speed of the average wireless broadband home Internet connection. Few devices were capable of the full throttle when the technology was first released. Coverage of true 4G was limited to large metropolitan areas. Outside of the covered areas, 4G phones regressed to the 3G standards. When 4G first became available, it was simply a little faster than 3G. 4G is not the same as 4G LTE which is very close to meeting the criteria of the standards.

4G LTE Long Term Evolution – LTE sounds better. This buzzword is a version of 4G that is the latest advertised technology and is getting very close to the speeds needed as the standards are set. When you start hearing about LTE Advanced, then we will be talking about true fourth generation wireless technologies because they are the only two formats realized by the International Telecommunications Union as True 4G at this time. But forget about that because 5G is coming soon to a phone near you. Then there is XLTE which is a bandwidth charger with a minimum of double the bandwidth of 4G LTE and is available anywhere the AWS spectrum is initiated.


5G There are rumors of 5G being tested although the specifications of 5G have not been formally clarified. We can expect that new technology to be rolled out around 2020 but in this fast-paced world it will probably be much sooner than that. Seems like a long ways away but time flies and so will 5G at speeds of 1-10Gbps.

Where does it go from here and why does this site exist? Not sure where this path will lead but the reason I wrote this was to try to understand the lingo a bit better. I think I cleared it up for myself so I thought I would pass it along. Check out the rest of the site to understand more. Hope it helps!

Thursday, 25 January 2018

About Death Computer Virus: Russian Virus 666


What is Russian virus 666, and why it is called a death virus?

The Army manual back in the late 1990's stated that the Russians have a computer virus (666) that feeds the human brain information on every 25th frame. It is said that this puts the computer user into a trance and once there can be "programmed" at will or even given a heart attack (killed) if desired.

This topic was covered in a book called "The brain has no firewall".

According to Solntsev, one computer virus capable of affecting a person's psyche is Russian Computer Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this "25th frame effect" and its ability to subtly manage a computer user's perceptions. The purpose of this technique is to inject a thought into the viewer's subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.



Monday, 22 January 2018

YouTube New Policy January 1,2018:Paid Content


YouTube New Policy January 1,2018:Paid Content


In 2017 marked a tough year for many of us, with many issues affecting community and the revenue earned from advertising through the YouTube Partner Program (YPP). Issues more creators than ever are earning a living on YouTube, with there channel making about six figures up over 40% years but In 2018 a major focus for every YouTuber at YouTube is protecting our creator ecosystem & ensuring your revenue is more stable.

Whats Previous

Back in April, 2017, we set a YPP eligibility requirement of 10000 lifetime views. While that provided more information to determine whether a channel followed YouTube's guidelines and policies. It is been clear over the last few months that we need a higher standard.

Whats New

Starting today YouTube changed the eligibility requirement for monetization to 4,000 hours of watch time within the past 12 months and 1,000 subscribers. They are arrived at these new thresholds after thorough analysis and conversations with creators like us. They will allow us to significantly improve our ability to identify creators who contribute positively to the community and help drive more ad revenue to them. These higher standards will also help us prevent potentially inappropriate videos from monetizing which can hurt revenue for everyone.

For Existing Channels

On February 20th, 2018, we will also implement this threshold across existing channels on the platform, to allow for a 30 day grace period. On that date, channels with fewer than 1,000 subscribers or 4,000 watch hours will no longer be able to earn money on YouTube. When reach 1,000 subscribers and 4,000 watch hours they will be automatically reevaluated under strict criteria to ensure they comply with our policies. New channels will need to apply, and their application will be evaluated when they hit these milestones.

Friday, 19 January 2018

Motivational African Proverbs That Inspires You in Life ...!

Motivational African Proverbs That Inspires You in Life ...! Must Watch.....!





The tragedy of life is not death , but what we let die inside of us while we live. -Norman Cousins. This video is going to inspire and motivate you. Please hit like and subscribe channel for more such video. My motivanal speaker are sandeep maheswati, robin sharma, tony robbins...

Please Subscribes Ultimate Videos

Thursday, 18 January 2018

The Mystery of the Bermuda Triangle

The Mystery of the Bermuda Triangle

Bermuda Triangle is also known as Devil's Triangle. One of life’s great mysteries, the Bermuda Triangle region that lies in the North Atlantic Ocean between Bermuda, Miami and San Juan, Puerto Rico, has been the presumed cause of dozens and dozens of mind-boggling disappearances of ships and planes. Near of triangle it also disable all magnetic energy. 

Area of Bermuda Triangle

In 1964, Mr. Vincent Gaddis wrote in the magazine about the boundaries of the Bermuda Triangle. Vertices as Miami, San Juan, Puerto Rico, and Bermuda. Subsequent writers did not necessarily follow this definition.Some writers gave different boundaries and vertices to the triangle, with the total area varying from 1,300,000 to 3,900,000 Sq.km.  (500,000 to 1,510,000 sq mi).


How many planes and ships have been lost in the Bermuda Triangle?

The Bermuda Triangle, or Devil's Triangle, has been blamed for the disappearance of dozens of planes and ships in the past 100 years.

When Christopher Columbus sailed through the area on his first voyage to the New World, he reported that a great flame of fire crashed into the sea one night and that a strange light appeared in the distance a few weeks later. William Shakespeare’s play “The Tempest,” which some scholars claim was based on a real-life Bermuda shipwreck, may have enhanced the area’s aura of mystery.


Torpedo Bomber #28, the lead plane of Flight 19, which mysteriously vanished in the Bermuda Triangle

Wednesday, 10 January 2018

22 Dangerous Android Apps || Uninstall Immediately

22 Dangerous Android Apps || Uninstall Immediately


22 Dangerous Android Apps identify by cyber security company i.e check point (Software Technology Ltd.) according to them below listed Android Apps should uninstall Immediately. These apps are available on Google Play Store were found to contain malicious adware. Developer of apps can be earn income by Malicious adware. 

   1.   Smarts Swipe
   2.   Real time Booster
   3.   File Transfer Pro
   4.   LED Flashlight
   5.   Voice Recorder Pro
   6.   Free Wifi Pro
   7.   Call Recorder Pro
   8.   Call Recorder
   9.   Real time Cleaner
   10. Super Flashlight lite
   11. Wallpaper HD- Background
   12. Cool Flashlight 
   13. Master Wifi Key
   14. Wifi Security Master
   15. Test
   16. Free Wifi connect
   17. Brightest LED Flashlight Pro
   18. Brightest Flashlight
   19. Brightest LED Flashlight
   20. Call Recorder Manager
   21. Smart Free Wifi
   22. Dr. Clean Light

Malicious adware is a software which is use to display advertisements on android mobile screen.

Friday, 5 January 2018

Transmission Control Protocol/Internet Protocol (TCP/IP)

Transmission Control Protocol/Internet Protocol (TCP/IP) is uses to access the Internet. It consists set of protocols developed to establish a network of networks to provide a host with access to the Internet. This protocol is responsible for fully fledged data connectivity and transmitting the data end to end by providing other functions, including addressing, mapping and acknowledgment. The technology is so common that you would rarely refer to somebody use the full name. In other words, in common usage the acronym is now the term itself.

TCP/IP contains four layers, which differ slightly from the OSI model.

TCP/IP functionality is divided into four layers, each of which include specific protocols.

Application layer :-
 
This layer is provides applications with standardized data exchange. Its protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP).

Transport layer:-
 
This layer is is responsible for maintaining end-to-end communications across the network. TCP handles communications between hosts and provides flow control, multiplexing and reliability. The transport protocols include TCP and User Datagram Protocol (UDP), which is sometimes used instead of TCP for special purposes.

The network layer:-
 
This layer is also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error reporting.

The physical layer :-
 
This layer is consists of protocols that operate only on a link -- the network component that interconnects nodes or hosts in the network. The protocols in this layer include Ethernet for local area networks (LANs) and the Address Resolution Protocol (ARP).




Advantages of TCP/IP
 
TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the internet protocol suite can be modified easily. It is compatible with all operating systems, so it can communicate with any other system. The internet protocol suite is also compatible with all types of computer hardware and networks.


Tuesday, 2 January 2018

Founder of Hotmail : Sabeer Bhatia



Founder of Hotmail : Sabeer Bhatia

Sabeer Bhatia is an Indian entrepreneur who founded the webmail company Hotmail.com. He was Born in 30 December 1968.

Image result for hotmail logo
After graduation, Sabeer briefly worked for Apple Computer (as a hardware engineer) and Firepower Systems Inc. He, along with his colleague Jack Smith, set up Hotmail on 4 July 1996, American Independence Day, symbolizing "freedom" from ISP-based e-mail and the ability to access a user's inbox from anywhere in the world


As President and CEO, Bhatia led Hotmail until its eventual acquisition by Microsoft in 1998. Bhatia worked at Microsoft for a little over a year after the Hotmail acquisition and in April 1999, left Microsoft to start another venture, Arzoo Inc, an e-commerce firm.In July 2011 Hotmail had 360 million registered users, less than Google's Gmail service.

Bhatia started a free messaging service called JaxtrSMS. He said that JaxtrSMS would do to SMS what Hotmail did for e-mail. Claiming it to be a disruptive technology, he says that the operators will lose revenue on the reduction in number of SMSes on their network but will benefit from the data plan that the user has to buy. To date, JaxtrSMS service has failed to replicate the success of Hotmail. Recently[when?], he invested in email collaboration software, ccZen.

Father of Fibre optics: Narinder Singh Kapany

Father of Fibre(Fiber) optics: Narinder Singh Kapany

Sardar Narinder Singh Kapany
Narinder Singh Kapany (Punjabi: ਨਰਿੰਦਰ ਸਿੰਘ )(born 31 October 1926) is an Indian-born American physicist known for his work in fibre optics.He was named as one of the seven 'Unsung Heroes' by Fortune in their 'Businessmen of the Century' issue (1999-11-22).He is also known as "Father of Fiber Optics". The term fibre optics was coined by Singh Kapany in 1956.He is a former IOFS officer.





Image result for fibre optic
Fibre Optic 

Research Scholar:

As an author and lecturer, Kapany has published over 100 scientific papers and four books on opto-electronics and entrepreneurship. He has lectured to various national and international scientific societies. His article on Fibre optics in Scientific American in 1960 established the term "fibre optics. In November 1999, Fortune magazine published profiles of seven people who have greatly influenced life in the twentieth century but are unsung heroes. Kapany was one of them.